MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 508a816001e6d2f7b6617d9009e97c533d02d366055dad4eb17a9ee38915fa4b. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Threat unknown


Vendor detections: 4


Intelligence 4 IOCs YARA File information Comments

SHA256 hash: 508a816001e6d2f7b6617d9009e97c533d02d366055dad4eb17a9ee38915fa4b
SHA3-384 hash: 409d3a4df4ff30a7f7362dcc38f3c7fda8a1b03676f01911f4b8ffa8cb42044287a45f9fb5c5c2ff437eac218c1f4799
SHA1 hash: 1c625fadff1b7a509a6eb16b72651467354266d0
MD5 hash: 382258edbbbd2fa457d71daba12c4a97
humanhash: wolfram-william-delaware-nine
File name:46.dll
Download: download sample
File size:421'888 bytes
First seen:2021-08-28 14:35:21 UTC
Last seen:2021-08-28 15:54:56 UTC
File type:Executable exe
MIME type:application/x-dosexec
imphash 1b39fdd128f4435e110614f6dc1ba005
ssdeep 12288:dj7h2c14HhTh89Oi2Un6fldp0L2P7ys+:dj12ciHhN0OdfG
Threatray 25 similar samples on MalwareBazaar
TLSH T1F194131D66E177DBE40905F64992A3687DFAFBE34DACF38F027566190DBB1A0340A381
Reporter Anonymous
Tags:exe

Intelligence


File Origin
# of uploads :
2
# of downloads :
99
Origin country :
n/a
Vendor Threat Intelligence
Malware family:
n/a
ID:
1
File name:
46.dll
Verdict:
No threats detected
Analysis date:
2021-08-28 14:37:55 UTC
Tags:
n/a

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Result
Verdict:
Suspicious
Maliciousness:

Behaviour
Sending a UDP request
Running batch commands
Creating a process with a hidden window
Launching a process
Result
Threat name:
Unknown
Detection:
malicious
Classification:
troj.evad
Score:
96 / 100
Signature
Creates an autostart registry key pointing to binary in C:\Windows
Injects a PE file into a foreign processes
Modifies the context of a thread in another process (thread injection)
Multi AV Scanner detection for dropped file
Sigma detected: CobaltStrike Load by Rundll32
Sigma detected: CobaltStrike Process Patterns
Sigma detected: UNC2452 Process Creation Patterns
Uses cmd line tools excessively to alter registry or file data
Uses ping.exe to check the status of other devices and networks
Uses ping.exe to sleep
Writes to foreign memory regions
Behaviour
Behavior Graph:
behaviorgraph top1 signatures2 2 Behavior Graph ID: 473184 Sample: 46.dll Startdate: 28/08/2021 Architecture: WINDOWS Score: 96 106 Multi AV Scanner detection for dropped file 2->106 108 Sigma detected: UNC2452 Process Creation Patterns 2->108 110 Sigma detected: CobaltStrike Load by Rundll32 2->110 112 Sigma detected: CobaltStrike Process Patterns 2->112 12 loaddll64.exe 1 2->12         started        14 rundll32.exe 2->14         started        16 rundll32.exe 2->16         started        process3 process4 18 rundll32.exe 12->18         started        20 cmd.exe 1 12->20         started        23 rundll32.exe 12->23         started        25 4 other processes 12->25 signatures5 27 cmd.exe 1 18->27         started        114 Uses ping.exe to sleep 20->114 116 Uses cmd line tools excessively to alter registry or file data 20->116 118 Uses ping.exe to check the status of other devices and networks 20->118 31 rundll32.exe 20->31         started        33 cmd.exe 1 23->33         started        35 cmd.exe 1 25->35         started        process6 dnsIp7 94 127.0.0.1 unknown unknown 27->94 124 Uses ping.exe to sleep 27->124 37 rundll32.exe 3 27->37         started        40 conhost.exe 27->40         started        42 PING.EXE 1 27->42         started        44 PING.EXE 1 33->44         started        47 rundll32.exe 33->47         started        49 conhost.exe 33->49         started        51 rundll32.exe 35->51         started        53 conhost.exe 35->53         started        55 PING.EXE 1 35->55         started        signatures8 process9 dnsIp10 92 C:\Users\user\AppData\...\kghtcuwsghgk.exe, PE32+ 37->92 dropped 57 cmd.exe 1 37->57         started        60 cmd.exe 1 37->60         started        62 cmd.exe 1 37->62         started        96 192.168.2.1 unknown unknown 44->96 file11 process12 signatures13 120 Uses ping.exe to sleep 57->120 64 rundll32.exe 57->64         started        67 conhost.exe 57->67         started        69 PING.EXE 1 57->69         started        122 Uses cmd line tools excessively to alter registry or file data 60->122 71 reg.exe 1 1 60->71         started        73 conhost.exe 60->73         started        75 conhost.exe 62->75         started        process14 signatures15 98 Writes to foreign memory regions 64->98 100 Modifies the context of a thread in another process (thread injection) 64->100 102 Injects a PE file into a foreign processes 64->102 77 cmd.exe 1 64->77         started        80 cmd.exe 1 64->80         started        82 chrome.exe 64->82         started        104 Creates an autostart registry key pointing to binary in C:\Windows 71->104 process16 signatures17 126 Uses cmd line tools excessively to alter registry or file data 77->126 84 reg.exe 1 77->84         started        86 conhost.exe 77->86         started        88 conhost.exe 80->88         started        90 reg.exe 1 80->90         started        process18
Threat name:
Win64.Trojan.BazarLoader
Status:
Malicious
First seen:
2021-08-28 14:36:05 UTC
AV detection:
10 of 28 (35.71%)
Threat level:
  5/5
Result
Malware family:
n/a
Score:
  6/10
Tags:
persistence
Behaviour
Modifies registry key
Runs ping.exe
Suspicious behavior: EnumeratesProcesses
Suspicious use of WriteProcessMemory
Adds Run key to start application
Unpacked files
SH256 hash:
508a816001e6d2f7b6617d9009e97c533d02d366055dad4eb17a9ee38915fa4b
MD5 hash:
382258edbbbd2fa457d71daba12c4a97
SHA1 hash:
1c625fadff1b7a509a6eb16b72651467354266d0
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

  
Delivery method
Distributed via e-mail link

Comments